Abstract

Nowadays, network security problems are emerging one after another. In the face of these security problems, various security products have appeared. At the same time, various security products deployed in the network generate a large number of security events (log files) every day, and how to extract valuable information has become an urgent problem to be solved. The purpose of this article is to study the application of data mining and fusion technology in the security management of sensitive data in the data center. This article first summarizes the basic theories of data mining and fusion, and then extends the core technology of data mining and data fusion, and side-by-side combined with the current status of the security management of sensitive data in the data center, we use data mining and fusion technology to research and analyze the application of the sensitive data security management in the data center. This paper systematically explains the architecture and algorithm implementation of security management based on data mining and fusion technology, and the application of data mining and fusion technology in the security management of sensitive data in the data center is investigated and researched through the comparative method, field research and other research methods. The experimental research shows that the sensitive data security is compared with the traditional data center. Management, the data security management system using data mining and fusion technology has more excellent performance.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.